Illuminating the intersection of physical and cyber security

Illuminating the intersection of physical and cyber security

Access Management

The vast majority of cyber breaches leverage compromised credentials. Multi-factor (MFA) is a critical security measure for verifying a user’s identity, and yet many sensitive systems don’t use MFA. Why is that? At this year’s RSA Conference in San Franciso, I went about looking for an answer to that very […]

Despite notable investments in Privileged Access Management (PAM) technologies, privileged accounts are still overexposed. Historically, PAM providers have focused on controlling access to accounts and their passwords, not on the activities an administrator needs to perform. The result is an excess of privileged accounts and privileged access control groups with […]

By Robin Tandon, Director of Product Marketing, Cloud Solutions, HID Global The way ID cards are used in the enterprise and on college and university campuses has changed dramatically in recent years. Once a simple identification tool, corporate ID badges now provide the means to open doors and access IT […]

This New Solution Enables Developers and Network Admins to Support What Work Looks Like Today – IoT, Edge Computing, Cloud and Multi-Cloud – Without the Need for a VPN Ahead of this announcement, Brilliance Security Magazine spoke with Don Boxley, CEO and Founder at DH2i to get his unique perspective […]